SLRV: An RFID mutual authentication protocol conforming to EPC generation-2 standard

被引:0
|
作者
Khalifa City Womens College, Higher College of Technology HCT, Abu Dhabi, United Arab Emirates [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
关键词
All Open Access; Hybrid Gold; Green;
D O I
10.12928/telkomnika.v13i3.1440
中图分类号
学科分类号
摘要
19
引用
下载
收藏
页码:1054 / 1061
相关论文
共 50 条
  • [1] A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard
    Chang, Chin-Chen
    Chen, Wei-Yi
    Cheng, Ting-Fang
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 642 - 645
  • [2] A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard
    Tang, Lin
    Bai, Enjian
    Wu, Wenqiang
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1845 - +
  • [3] Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    Chien, Hung-Yu
    Chen, Che-Hao
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) : 254 - 259
  • [4] Improvement on standard protocol of RFID EPC class-1 generation-2
    Yeh, Tzu-Chang
    Lo, Shih-Ching
    Chung Cheng Ling Hsueh Pao/Journal of Chung Cheng Institute of Technology, 2013, 42 (02): : 187 - 198
  • [5] Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 Standard
    Pang, Liaojun
    He, Liwei
    Pei, Qingqi
    Wang, Yumin
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1870 - 1875
  • [6] Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol
    Peris-Lopez, Pedro
    Hernandez-Castro, Julio C.
    Tapiador, Juan M. E.
    van der Lubbe, Jan C. A.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2011, 24 (06) : 1061 - 1069
  • [7] Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
    Han, Daewan
    Kwon, Daesung
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 648 - 652
  • [8] An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard
    Chuang, Tsung-I
    Yang, Wei-Ning
    Lo, Nai-Wei
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (05): : 727 - 732
  • [9] Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard
    Zavvari, Azam
    Shakiba, Masoud
    Islam, Mohammad Tariqul
    Sundararajan, Elankovan
    Singh, Mandeep Jit
    4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013), 2013, 11 : 778 - 784
  • [10] Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol
    Nasour Bagheri
    Masoumeh Safkhani
    Majid Naderi
    Neural Computing and Applications, 2014, 24 : 799 - 805